Event ID 1102 represents a fundamental security audit event that Windows generates whenever the Security event log undergoes manual or automated clearing. This event serves as an immutable record of log maintenance activities and potential security incidents. The event contains critical forensic information including the Security ID (SID) of the account that performed the action, the logon ID associated with the session, and precise timestamp data.
The event structure includes several key fields: the subject security identifier, account name, account domain, and logon ID. These fields enable security analysts to trace the log clearing action back to specific user sessions and determine whether the action was authorized. Windows generates this event using the Local Security Authority (LSA) subsystem, ensuring it gets written to the Security log before any clearing operation begins.
In enterprise environments, Event ID 1102 often triggers automated security responses through SIEM systems and security monitoring tools. The event's presence indicates a significant change to the audit trail, requiring immediate attention from security teams. Organizations typically configure alerts for this event because unauthorized log clearing represents a common technique used by attackers to eliminate evidence of their activities.
Windows Server 2025 and Windows 11 24H2 introduced additional context fields in Event ID 1102, including process information and command-line details when the clearing occurs through PowerShell or other administrative tools. This enhanced logging provides security teams with more comprehensive forensic data for incident response activities.